ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3AFDCCAF4425
|
Infrastructure Scan
ADDRESS: 0x2d6f7bf1fefa7ae09a3cb52734f4f10aac06e926
DEPLOYED: 2026-04-24 19:11:11
LAST_TX: 2026-04-30 19:12:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0x2d6f7bf1fefa7ae09a3cb52734f4f10aac06e926… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Clearing temporary registers for deep-trace… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: b2444ab87675fd95. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x20b059ce97a3c154c9724fe2a80c60891dccbd8f 0x983dca1a1e95108b2c49641d296e46959d599439 0x556bf0ab82f9f4b643d3f3b82c07a1f4e345cc04 0xbb49d0da2dd2460955f556045b81d5c6e9daa9b3 0xf4aafa6e9fbbec6a2402f05ca9e935ee50f7312c 0x14388c3e191d5c4553deaddd7868391218b636ca 0xe69631bef1b3efc24975935082926211d0a88b26 0xd14c2750510bf1f91e693f45988720bd65e8d22a 0x318410f48d654167d981edef708b6a763393386f 0x0e525d19e01279aaa73826e081844b6ae616f8a9 0x7450f03af60f835adc34d1ad8605c145d21be1dc 0x82e23e1df983f1b12912d06239acc86fd1e03574 0x0205f891f52918722b10dcb1af52258f10063058 0x7bb5d04a2081bcd0cadac5849542294f2928c3c5 0x3c652e47e2f3ce336cedf295c8f044b0e8101451 0x9ff2264ae92e70b125c24135244a17f24ec3069f 0x38baa0dbd118c9b9bbcd451350dd8dddaa6b4515 0x092267a86cc4d0fbef351dab5283532ffd8a45ac 0xf0e43bd5d771c40542c51809fc4888fb3c7fe7ef 0xb8985cbac40599ce97b4881d445deead8ea94046